National Repository of Grey Literature 18 records found  1 - 10next  jump to record: Search took 0.00 seconds. 
Detection of Timing Side-Channels in TLS
Koscielniak, Jan ; Malík, Viktor (referee) ; Vojnar, Tomáš (advisor)
Protokol TLS je komplexní a jeho použití je široce rozšířené. Mnoho zařízení používá TLS na ustanovení bezpečné komunikace, vzniká tak potřeba tento protokol důkladně testovat. Tato diplomová práce se zaměřuje na útoky přes časové postranní kanály, které se znovu a znovu objevují jako variace na už známé útoky. Práce si klade za cíl usnadnit korektní odstranění těchto postranních kanálů a předcházet vzniku nových vytvořením automatizovaného frameworku, který pak bude integrován do nástroje tlsfuzzer, a vytvořením testovacích scénářů pro známé útoky postranními kanály. Vytvořené rozšíření využívá program tcpdump pro sběr časových údajů a statistické testy spolu s podpůrnými grafy k rozhodnutí, zda se jedná o možný postranní kanál. Rozšíření bylo zhodnoceno pomocí nových testovacích skriptů a byla předvedena jeho dobrá schopnost rozlišit postranní kanál. Rozšíření spolu s testy je nyní součástí nástroje tlsfuzzer.
Application for automated power trace measurement
Karabina, Lukáš ; Lieskovan, Tomáš (referee) ; Gerlich, Tomáš (advisor)
Master’s thesis is focused on providing information for the design and implementation of an application for automated power trace measurement. The first and second sections of this thesis summarise the findings on the actual measurement of the power consumption and the use of the results in the analysis of the robustness of cryptographic systems against side channel attacks. In this sections, several methods that can be used in such an analysis are presented. A section on the devices with which the application will communicate is also included. The practical part of this thesis deals with the actual design and development of the application. The design patterns used and the procedures by which the application is created are presented. The individual subsections further describe the actual development, implementation, testing and associated problems.
Modern cryptanalysis
Petřík, Tomáš ; Morávek, Patrik (referee) ; Martinásek, Zdeněk (advisor)
Issues of this thesis are focused on side-channel cryptanalysis. Particularly attention is paid to differential power analysis, when is simulated an attack on the cryptographic module for different conditions and for different structural features of this module. As the cryptographic module is used a PIC microcontroller, which is operating with AES symmetric encryption algorithm. For this purpose, a design of experimental printed circuit board was created. Then, this PCB was equipped only with the necessary components for the function of the cryptographic module. Cryptanalysis is aimed on current consumption of crypto module that is caused by execution of AddRoundKey instructions. Power consumption of PIC microcontroller is measured in depending on the size of power supply voltage, size of serial resistor, size of bypass capacitor, and this thesis also examines the influence of ambient temperature on power consumption of PIC. The measured values are graphically presented and then discussed.
Hiding of current consumption
Hirš, David ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
Power analysis presents the typical example of successful attacks against trusted cryptographic devices such as smart cards or embedded devices. Nowadays, the popularity of Internet of Things (IoT) is growing therefore, designers sould implement cryptographic algorithms with countermeasures in order to defend against these types of attacks. The bachelor's thesis focus on the implementation of ultra-lightweight block cipher PRESENT and execution of Simple power analysis and Differential power analysis to reveal the secret key. Power analysis is firstly performed on cipher PRESENT with no implemented countermeasures and the attack was successful. Then the countermeasures were implemented and there were no leakage about the secret key. The countermeasures are using the hardware randomization of FPGA boards.
Realization of differential power analysis
Marek, Pavel ; Dzurenda, Petr (referee) ; Martinásek, Zdeněk (advisor)
Nowadays, it is not enough to pay attention to encryption algorithm security from the mathematical aspect only. It is also necessary to pay attention to the implementation of encryption algorithm, because encryption devices can show plenty of information about implemented encryption via undesirable communication. This bachelor thesis deals with side channels issues (especially power side channel) and their use to obtain the secret key of AES encryption algorithm. For this purpose there are three operations realized in this thesis. At first, there is experimental workplace designed, which provides automatic saving of waveforms of encryption. Then there is a simple and differential power analysis of these waveforms performed. All parts are theoretically described in individual chapters. After theoretical description there is the practical part, which describes a proper realization of all tasks.
Side Channel Cryptanalysis
Martinásek, Zdeněk ; Vaněk, Tomáš (referee) ; Dočkal,, Jaromír (referee) ; Zeman, Václav (advisor)
Side channels fundamentally changes the view of the cryptographic system security in cryptography. It is not enough to analyze the security algorithm only from a mathematical point of view using abstract models but it is necessary to focus on the implementation of the algorithms. The introduction of the thesis deals with the basic terms, principles of side channel attacks and basic clasification of side channels. The following chapter describes the objectives of the thesis. The main goal of the thesis is to propose and experimentally verify a new power analysis method whish will use the neural network. This main goal was based on the realized analyzes presented in the following chapters. These chapters contain a detailed analysis of currently used power analysis and analysis of AES encryption algorithm. AES was selected becouse the algorithm is resistant to the conventional cryptoanalysis. The following section describes the experimental results of the optimization of existing methods, the influence of the parameters affecting power consumption and the results of the proposed analysis using neural networks. This section includes the discussion of the results. This type of side channel attack has not been published yet thus it is a completely new idea. The final goal of the thesis was to summarize the possible countermeasures protecting against the side channel attacks.
Security of data stored on the hard disk
Polášková, Markéta ; Hajný, Jan (referee) ; Martinásek, Zdeněk (advisor)
This work is dedicated to the security of data stored on the hard drive of your computer and using encryption. The first part explains the basic concepts of cryptography and describes her in history. In other chapters, this work is dedicated to a description of the side channels and attacks on these channels. How can the attacker obtain information from a cryptographic module. The following section describes the types of encryption they use nowadays and what are their weaknesses. Bachelor thesis continues with examples of individual encryption programs and device ICZ Protect Boot. The last part deals with resistance testing on equipment ICZ Protect Boot. Testing of resistance to flow analysis using a side channel. Finally, bachelor thesis deals with the analysis of communication between the computer and ICZ Protect Boot.
Experimental testbed for side channel analysis
Vidlařová, Pavla ; Martinásek, Zdeněk (referee) ; Gerlich, Tomáš (advisor)
This thesis deals with getting familiar with the problematics of side channels. Theoretical part is described by basic concepts, types of side-channels and some possible side-channel attacks. Main focus is put on power side channel, which is used in practical part of the work. Followed by description of power analysis - simple power analysis and differential power analysis. Last part is description of workplace and all its parts, in which measurement will be performed. The practical part deals with realization of the workplace, measurement of power side channels on implementation of AES algorithm. Follows processing and visualisation of the values with SIde Channel Analysis toolKit.
Side-channel cryptanalysis using deep learning methods
Matuška, Jakub ; Martinásek, Zdeněk (referee) ; Sikora, Pavel (advisor)
Cryptographic systems are getting unbreakable on paper. Therefore attacks on the implementations using side-channels are getting in front of others. Especially when neural networks (NN) got involved in this field. With deep learning, these attacks can recover secret keys even on implementations with countermeasures. Deep learning assisted sidechannel analysis (DL-SCA) dominated this field over the statistical methods. That is why it is important to understand its concepts. This thesis will showcase these methods and introduce some new tools regarding correlation power analysis (CPA) and the training of NNs. An attack on ASCAD dataset will take place and the proposed NN to conduct this attack will be evaluated against other models using proper metrics. Lastly, improvements to SITM (See-In-The-Middle) attack using deep learning are proposed and implemented in the console application.
Application for automated power trace measurement
Karabina, Lukáš ; Lieskovan, Tomáš (referee) ; Gerlich, Tomáš (advisor)
Master’s thesis is focused on providing information for the design and implementation of an application for automated power trace measurement. The first and second sections of this thesis summarise the findings on the actual measurement of the power consumption and the use of the results in the analysis of the robustness of cryptographic systems against side channel attacks. In this sections, several methods that can be used in such an analysis are presented. A section on the devices with which the application will communicate is also included. The practical part of this thesis deals with the actual design and development of the application. The design patterns used and the procedures by which the application is created are presented. The individual subsections further describe the actual development, implementation, testing and associated problems.

National Repository of Grey Literature : 18 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.